This paper will explain the security considerations regarding MIBs prevention of unauthorized access according to RFC 3813.

The MPLS Label Switch Router (LSR) MIB and MPLS Traffic Engineering (TE) MIB are used to manage low and high level MPLS objects. They can also be used to create LSPs. What are the security considerations for these MIBs to prevent unauthorized access? Write half-page explanation. Use RFC 3813 (http://www.rfc-archive.org/getrfc.php?rfc=3813) to research the answer. According to the documentation for RFC 3813 the security considerations “there are a number of management objects defined in this MIB module with a MAX-ACCESS clause of read-write and/or read-create… considered sensitive or vulnerable in some network environments. The support for SET operations in a non-secure environment without proper protection can have a negative effect on network operations… tables and objects and their sensitivity/vulnerability… Some of the readable objects in this MIB module for example “objects with a MAX-ACCESS other than not-accessible” may be considered sensitive or vulnerable in some network environments.” http://www.rfc-archive.org/getrfc.php?rfc=3813#top Excerpt from page 55 section 11 of RFC 3813

11. Security Considerations

Clearly this Management Information Base segment is possibly instrumental for supervision of Multiprotocol Label Switching Label Switching Routers. The Management Information Base can be utilized for structure of certain objects, and everything that can be structured can be inaccurately structured, which has possibly unfortunate outcomes.

There is a collection of management objects translated in the Management Information Base faculty “with a MAX-ACCESS clause of read-write and/or read-create.” These objects are regarded as susceptible or sensitive in most “network environments. The support for SET...

YOU MAY ALSO FIND THESE DOCUMENTS HELPFUL

...Internet Standard Management Framework
Introduction:
TCP/IP networkmanagement functions are most normally connected with the key protocol responsible for implementing the Simple NetworkManagement Protocol (SNMP). Many people have heard of SNMP, and it is common for SNMP to be considered the way that networkmanagement is performed in TCP/IP. This is true to an extent, but is really an overview. The actual SNMP protocol is only one part of a higher-level networkmanagement strategy called the Internet Standard Management Framework. In order to really understand how SNMP works, we need to first have some experience on the way this networkmanagement is structured as a whole.
The Internet Standard Management Framework includes all of the technologies that comprise the TCP/IP networkmanagement solution. The SNMP Framework consists of a number of architectural components that defines how management information is planned, how it is stored, and how it is exchanged using the SNMP protocol. This Framework is derived from and builds upon both the original Internet-standard Management Framework (SNMPv1) and the second Internet-standard Management Framework...

...EnterpriseNetworkManagement
While participating in this weeks discussion threads I took an interest in researching and testing some software tools from a company by the name of Solarwinds. Solarwinds was founded in 1999, which focused on providing products to address management challenges that IT professionals might come across. Solar Wind offers a variety of tools and applications related to computer networks, servers, storage and virtualization, but their 3 core enterprise products are, Network Performance Monitor, IP Address Manager, and NetFlow Traffic Anayzer.
Solarwinds Network Performance Monitor provides an all-in-one solution for detection, diagnosis and resolution for network related issues. It is also important to note that this Network Performance Monitor is only compatible with Windows 2003 and 2008 Server (32-bit or 64-bit). With a built-in centralized messaging system all alerts, syslog data, events and traps can be managed and configured in the web-base user interface, which can be quite useful when overseeing multiple devices and computers. The Automated Network Device Discovery module allows the network administrator to schedule network wide scans to identify new and existing network devices. In my opinion the most unique feature for this product would...

...﻿
NetworkManagement
Week 2
NTC/411
Introduction
Today with technology evolving so does the system(s) that it affects. In the varied performances of each requirement there are also a set of protocols that are adhered to when information is transmitted across the network. In this paper a few of those protocols will be introduced along with how management of network traffic is performed through the use of out-of-band (OBM) and in-band methods. Managing a network involves various tools and knowledge of the organizations system in order to remain on top of the issues or problems that continue to plague the network which includes but not limited to hardware break downs, intrusions, disasters and security. Also addressed in this paper are the effects of enterprise systems and its influence by business intelligence (BI) as well as decision support systems.
Out-of-band/In-band NetworkManagement
Managing of networks may occur when network managers need to respond remotely or within the sites network. Two of the methods described here are the out-of-band and in-band networkmanagement. In-band management as defined by Tulman “An in-band management involves managing devices through the common protocols such as telnet or...

...standards used for the various layers in an Ethernet-based network that is managed by the Internet management protocol? Assume that the Ethernet runs on 10 Mbps on an unshielded twisted-pair cable?
A) The standards used for the various layers in an Ethernet-based network that is managed by the Internet management protocol are :
a. Organizational Model
b. Information Model
c. Communication Model
d. Functional Model
The organizational model describes the components of networkmanagement and their relationships.
The information model is concerned with the structure of information.
The communication model describes on how the information is exchanged between systems.
The functional model addresses user-oriented applications.
3)
6) Communication between two ATM switches is broken in a private ATM network. You are troubleshooting the problem from a networkmanagement station. What M interfaces would you use?
A) The M2 interface is used to manage the private ATM network. The management information on ATM links between devices is gathered from ILMI MIB.
The ILMI specifications define the administrative and UNI groups of the ATM forum MIB. The administrative group defines a general-purpose registry for locating ATM network services such as the ATM name answer server (ANS). Other...